Max Vozeler discovered several format string vulnerabilities in the movemail utility of Emacs, the well-known editor. Via connecting to a malicious POP server an attacker can execute arbitrary code under the privileges of group mail (or worse, depending on the permissions of the movemail binary).
Created attachment 110458 [details] Proposed fix for this issue.
This issue should also affect RHEL2.1.
removing embargo, http://list-archive.xemacs.org/xemacs-announce/200502/msg00001.html
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-112.html